Ajou University repository

Permission Management Method for before and after Applications the Update in Android-based IoT Platform Environment
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorPark, In Kyu-
dc.contributor.authorKwak, Jin-
dc.date.issued2018-09-25-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36312-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85055639979&origin=inward-
dc.description.abstractThe Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google's infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user's consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.-
dc.description.sponsorshipThis work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110).-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAndroid IoT platform-
dc.subject.meshAndroid permissions-
dc.subject.meshAndroid securities-
dc.subject.meshAndroid update-
dc.subject.meshDevelopment tools-
dc.subject.meshInfrastructure services-
dc.subject.meshManagement method-
dc.subject.meshSecurity threats-
dc.titlePermission Management Method for before and after Applications the Update in Android-based IoT Platform Environment-
dc.typeConference-
dc.citation.conferenceDate2018.1.29. ~ 2018.1.31.-
dc.citation.conferenceName2018 International Conference on Platform Technology and Service, PlatCon 2018-
dc.citation.edition2018 International Conference on Platform Technology and Service, PlatCon 2018-
dc.citation.title2018 International Conference on Platform Technology and Service, PlatCon 2018-
dc.identifier.bibliographicCitation2018 International Conference on Platform Technology and Service, PlatCon 2018-
dc.identifier.doi10.1109/platcon.2018.8472749-
dc.identifier.scopusid2-s2.0-85055639979-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8464036-
dc.subject.keywordAndroid IoT platform-
dc.subject.keywordAndroid permissions-
dc.subject.keywordAndroid security-
dc.subject.keywordAndroid update-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaSafety, Risk, Reliability and Quality-
dc.subject.subareaHardware and Architecture-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaComputer Science Applications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.